{"title":"Quantum gate encryption and quantum signature scheme based on public identity information","authors":"Yunlong Wu, Jinqing Li, Xiaoqiang Di, Shi Qiu","doi":"10.1007/s11128-026-05105-4","DOIUrl":null,"url":null,"abstract":"<div><p>Conventional digital signature and authentication systems lack security and are unable to identify possible risks from quantum computing or eavesdropping. Therefore, the scheme is designed and innovative in that, first, a quantum man-in-the-middle attack (QMITM) threat model is constructed, which analyzes and improves the security threats that may be triggered by quantum attackers in order to ensure the reliability of signatures during authentication and transmission. Secondly, in the phase of quantum identity authentication, an encryption method based on quantum gate transformation is proposed and implemented. The algorithm is used in the quantum identity authentication process. In addition, in order to provide security and resist quantum attacks in the signature phase, quantum signature technology based on unitary operation is adopted. Finally, in the security analysis, its security based on quantum key distribution protocol (QKDP) is supported by formal proof, which meets the requirements of unfalsifiability, non-repudiation and better qubit efficiency.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"25 3","pages":""},"PeriodicalIF":2.2000,"publicationDate":"2026-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Quantum Information Processing","FirstCategoryId":"101","ListUrlMain":"https://link.springer.com/article/10.1007/s11128-026-05105-4","RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"PHYSICS, MATHEMATICAL","Score":null,"Total":0}
引用次数: 0
Abstract
Conventional digital signature and authentication systems lack security and are unable to identify possible risks from quantum computing or eavesdropping. Therefore, the scheme is designed and innovative in that, first, a quantum man-in-the-middle attack (QMITM) threat model is constructed, which analyzes and improves the security threats that may be triggered by quantum attackers in order to ensure the reliability of signatures during authentication and transmission. Secondly, in the phase of quantum identity authentication, an encryption method based on quantum gate transformation is proposed and implemented. The algorithm is used in the quantum identity authentication process. In addition, in order to provide security and resist quantum attacks in the signature phase, quantum signature technology based on unitary operation is adopted. Finally, in the security analysis, its security based on quantum key distribution protocol (QKDP) is supported by formal proof, which meets the requirements of unfalsifiability, non-repudiation and better qubit efficiency.
期刊介绍:
Quantum Information Processing is a high-impact, international journal publishing cutting-edge experimental and theoretical research in all areas of Quantum Information Science. Topics of interest include quantum cryptography and communications, entanglement and discord, quantum algorithms, quantum error correction and fault tolerance, quantum computer science, quantum imaging and sensing, and experimental platforms for quantum information. Quantum Information Processing supports and inspires research by providing a comprehensive peer review process, and broadcasting high quality results in a range of formats. These include original papers, letters, broadly focused perspectives, comprehensive review articles, book reviews, and special topical issues. The journal is particularly interested in papers detailing and demonstrating quantum information protocols for cryptography, communications, computation, and sensing.